SlideShare a Scribd company logo
1 of 16
Implementation of secure mail server
       in cloud environment



       Advanced Network Security
            Dr.Azizol Abdullah
Team Work


Nadim K. Madi
Solmaz Salehian
Farzaneh Masoumiyan
Abdulraqeb Abdullah
Outlines


I n    t   r   o   d   u   c t   i on
 me    t   h   o   d   o   l o   gy
 Mi    g   r   a   t   i   ng     t o c l oud
  e n   v   i   r   o   n   me    nt
Co     n   c   l   u   s   i o   n?
Mail transfer agent


      MTA




    Postfix


 Transport Layer
 Security(TLS)        Secure Mail server
       &
  SMTP-AUTH
Introduction
Postfix security
 Transport Layer Security (TLS) : make privacy by using
  symmetric cryptography and a keyed message authentication
  code message reliability.

 SMTP-AUTH : which use Simple Authentication and Security
  Layer (SASL) Internet Standard method which can be used with
  protocols such as SMTP for adding authentication support to
  connection-based protocols .

Main aim of using postfix
 significant impact on Internet mail performance and security
Methodology
Linux-based platform has been configured as a server with
   postfix and covers TLS and SMTP_AUTH.

Implementation Steps:
 Installation (postfix)
 Configuration
    Authentication (SMTP_AUTH)
   Digital Certificates
   Encryption
 Testing
Installation
configuration
Authentication
Testing
Testing
Testing
Migrating to cloud environment


• Cloud-Based Email Services:
   – cheaper than running personal email service on-premise.
   – rapidly provision new users. More scalable.
   – Always run the latest software and configurations without upgrade
     hassles.
   – Shift the financial burden from upfront capital expense to ongoing
     operating expense.
Migrating to cloud environment cont ...

7. perform backups new cloud-based email service


6. start using cloud based-email solution


5. Assign the registered domains to several DNS records
                                                            Cloud-
4. forward email from old server to new cloud mailbox     Based Email
                                                            Service

3. create a profile to remember all email accounts


2. setup new users, storage, aliases, and SharePoint

1. new host can import emails from the current one
Conclusion
• A mail server has been configured and tested in Linux
  environment using postfix Email Transfer Agent to
  “send, receive, and deliver” emails.
• The main aim what is ensuring a security level has also been
  achieved using TLS Security Certificates. Also authentication
  mechanism is supported using SMTP-AUTH.
• This implementation can be migrated to cloud-based
  level, over 7 phases to ensure end-to-end functions adaption.
• A further digging for enhancement might be applied in the
  mail transfer agent part. As well as the concept of
  heterogeneity.
,  ,




Thank You for Your Attention

           Q&A

More Related Content

Viewers also liked

Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internetaggregate
 
All about email
All about emailAll about email
All about emailestefana4
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic MailPeter R. Egli
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpointguested929b
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation guest9e3d59
 

Viewers also liked (10)

How Email Works
How Email WorksHow Email Works
How Email Works
 
how email works
how email workshow email works
how email works
 
Presentation1.Ppt Email And Internet
Presentation1.Ppt Email And InternetPresentation1.Ppt Email And Internet
Presentation1.Ppt Email And Internet
 
All about email
All about emailAll about email
All about email
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 
Email ppt
Email pptEmail ppt
Email ppt
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
The Internet Presentation
The Internet Presentation The Internet Presentation
The Internet Presentation
 

Similar to Implementation of secure email server in cloud environment copy1

Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosGina Montgomery, V-TSP
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Finalniallmmackey
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overviewrsnarayanan
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM DatapowerSigortam.net
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird iiBanukaVidusanka
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayandreasschuster
 
CloudMail Slick
CloudMail SlickCloudMail Slick
CloudMail SlickRapidScale
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
TechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewTechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewMicrosoft TechNet
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Vaultastic
 
CensorNet MailSafe
CensorNet MailSafeCensorNet MailSafe
CensorNet MailSafetlloyduk
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxdeanmtaylor1545
 
10135 a 06
10135 a 0610135 a 06
10135 a 06Bố Su
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Vaultastic
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposalOsman Suliman
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Private Cloud
 

Similar to Implementation of secure email server in cloud environment copy1 (20)

Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud ScenariosTake a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
Take a Leap into the Connected Cloud; 3 Trending Hybrid Cloud Scenarios
 
Topsec Technology Cloud Arena Final
Topsec Technology   Cloud Arena   FinalTopsec Technology   Cloud Arena   Final
Topsec Technology Cloud Arena Final
 
SkyConnect
SkyConnectSkyConnect
SkyConnect
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
 
Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
SSO with kerberos
SSO with kerberosSSO with kerberos
SSO with kerberos
 
Outlook and thunderbird ii
Outlook and thunderbird iiOutlook and thunderbird ii
Outlook and thunderbird ii
 
apsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gatewayapsec SEPPmail Email Security Gateway
apsec SEPPmail Email Security Gateway
 
CloudMail Slick
CloudMail SlickCloudMail Slick
CloudMail Slick
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Lab08Email
Lab08EmailLab08Email
Lab08Email
 
TechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 OverviewTechNet Webcast: Exchange 2010 Overview
TechNet Webcast: Exchange 2010 Overview
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
 
CensorNet MailSafe
CensorNet MailSafeCensorNet MailSafe
CensorNet MailSafe
 
Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
 
10135 a 06
10135 a 0610135 a 06
10135 a 06
 
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...Webinar: Discover how Vaultastic integrates with your existing email infrastr...
Webinar: Discover how Vaultastic integrates with your existing email infrastr...
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Implementation of secure email server in cloud environment copy1

  • 1. Implementation of secure mail server in cloud environment Advanced Network Security Dr.Azizol Abdullah
  • 2. Team Work Nadim K. Madi Solmaz Salehian Farzaneh Masoumiyan Abdulraqeb Abdullah
  • 3. Outlines I n t r o d u c t i on  me t h o d o l o gy  Mi g r a t i ng t o c l oud e n v i r o n me nt Co n c l u s i o n?
  • 4. Mail transfer agent MTA Postfix Transport Layer Security(TLS) Secure Mail server & SMTP-AUTH
  • 5. Introduction Postfix security  Transport Layer Security (TLS) : make privacy by using symmetric cryptography and a keyed message authentication code message reliability.  SMTP-AUTH : which use Simple Authentication and Security Layer (SASL) Internet Standard method which can be used with protocols such as SMTP for adding authentication support to connection-based protocols . Main aim of using postfix  significant impact on Internet mail performance and security
  • 6. Methodology Linux-based platform has been configured as a server with postfix and covers TLS and SMTP_AUTH. Implementation Steps:  Installation (postfix)  Configuration Authentication (SMTP_AUTH) Digital Certificates Encryption  Testing
  • 13. Migrating to cloud environment • Cloud-Based Email Services: – cheaper than running personal email service on-premise. – rapidly provision new users. More scalable. – Always run the latest software and configurations without upgrade hassles. – Shift the financial burden from upfront capital expense to ongoing operating expense.
  • 14. Migrating to cloud environment cont ... 7. perform backups new cloud-based email service 6. start using cloud based-email solution 5. Assign the registered domains to several DNS records Cloud- 4. forward email from old server to new cloud mailbox Based Email Service 3. create a profile to remember all email accounts 2. setup new users, storage, aliases, and SharePoint 1. new host can import emails from the current one
  • 15. Conclusion • A mail server has been configured and tested in Linux environment using postfix Email Transfer Agent to “send, receive, and deliver” emails. • The main aim what is ensuring a security level has also been achieved using TLS Security Certificates. Also authentication mechanism is supported using SMTP-AUTH. • This implementation can be migrated to cloud-based level, over 7 phases to ensure end-to-end functions adaption. • A further digging for enhancement might be applied in the mail transfer agent part. As well as the concept of heterogeneity.
  • 16. ,  , Thank You for Your Attention Q&A

Editor's Notes

  1. 2nd: … between local-based mail system and cloud-based mail system.3rd: to handle more multiple process concurrently. Combining several platforms together.